CYBER

Windows Enterprise Incident Response

Enquiry
Programme Code D142
Domain
Cybersecurity
Level
Intermediate
Learning Partner(s)
Mandiant Academy
Duration
4 Days
Format Online
Rating
Competencies
Incident Response
Job Roles
ICT&SS Professional Security Testing Engineer Data Security Officer Cybersecurity Engineer

Overview

Learn fundamental investigative techniques to respond to today's cyber threats. This intensive and fast-paced programme is built upon a series of hands-on labs that highlight the phases of a targeted attack, sources of evidence and principles of analysis. Examples of skills taught include how to conduct rapid triage on a system to determine whether it is compromised, uncover evidence of initial attack vectors, recognise persistence mechanisms and investigate an incident throughout an enterprise.

Although the programme is focused on analysing Windows-based systems and servers, the techniques and investigative processes are applicable to all systems and applications. The programme includes detailed discussions of common forms of endpoint, network and file-based forensic evidence collection and their limitations as well as how attackers move around in a compromised Windows environment. This programme also explores information management that enriches the investigative process and bolsters an enterprise security programme. Discussion topics include the containment and remediation of a security incident, and the connection of short-term actions to longer-term strategies that improve organisational resiliency.

Key Takeaways

At the end of this programme, you will be able to:
  • Describe the incident response process, including the threat landscape, targeted attack life cycle, initial attack vectors used by different threat actors, and phases of an effective incident response process
  • Conduct system triage to answer key questions about what transpired across the enterprise during an incident
  • Apply lessons learned to proactively investigate an entire environment (including metadata, registry, event logs, services, persistence mechanisms and artifacts of execution) at scale for signs of compromise
  • Manage and effectively record information related to ongoing investigations and incidents
  • Understand the role of the remediation phase in an enterprise investigation
  • Understand how to hunt for threats using threat intelligence, anomaly detection and known threat actor techniques, tactics and procedures (TTPs)

Who Should Attend

  • Please refer to the job roles section.
  • This programme is targeted at Incident response team members, threat hunters and information, security professionals.

Prerequisites

  • Background in conducting forensic analysis, network traffic analysis, log analysis, security assessments and penetration testing, or security architecture and system administration. You must have a working understanding of the Windows operating system, file system, registry and use of the command line. Familiarity with Active Directory and basic Windows security controls, plus common network protocols, is beneficial.

What To Bring

Students are required to bring their own laptop that meets the following specs:
  • Windows 7+.
  • Core i5 or equivalent processor.
  • 6 GB (preferably 8 GB) of RAM.
  • 25 GB free HDD space.
  • Virtual machines are acceptable provided at least 4 GB or RAM can be allocated.
  • Microsoft Office installed outside the VM.
  • Admin/install rights.

You will receive a lab book and USB thumb drive containing all required class materials and tools.

Programme Structure

This programme is delivered via virtual instructor-led format, and comprised of the following modules, with labs included throughout the instruction:

  • Incident Response Process
  • Single System Analysis
  • Enterprise Investigations
  • Investigation Management & Remediation
  • Threat Hunting

Fees


Full Fee

Full programme fee

USD4000

9% GST on nett programme fee

USD360

Total nett programme fee payable, including GSTUSD4360

With effect from 1 Jan 2024

 

NOTE

Payment for this programme is to Ingram Micro Asia Pte Ltd.

How To Register


Agency-sponsored

Step 1 Apply through your organisation's training request system

Step 2 Your organisation's training request system (or relevant HR staff) confirms your organisation's approval for you to take the programme.

Your organisation will send registration information to the academy.

Organisation HR L&D or equivalent staff can click here for details of the registration submission process.


Step 3 GovTech Digital Academy will inform you whether you have been successful in enrolment.